ABSTRACT

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of as

chapter |2 pages

Part I

chapter |6 pages

Part I Introduction

chapter 1|18 pages

Introduction

chapter 2|26 pages

The Art of Security Assessment

chapter 3|48 pages

Security Architecture of Systems

chapter 4|32 pages

Information Security Risk

chapter 5|40 pages

Prepare for Assessment

chapter |4 pages

Part I Summary

chapter |2 pages

Part II

chapter |12 pages

Part II Introduction

chapter 6|22 pages

eCommerce Website

chapter 7|22 pages

Enterprise Architecture

chapter 8|32 pages

Business Analytics

chapter 9|18 pages

Endpoint Anti-malware

chapter 11|20 pages

Cloud Software as a Service (SaaS)

chapter |4 pages

Part II Summary

chapter |2 pages

Part III

chapter |2 pages

Part III Introduction

chapter 13|30 pages

Building an Assessment Program

chapter |4 pages

Part III Summary and Afterword